National Vulnerability Database

National Vulnerability Database

CVE-2017-3208 Detail

Current Description

The Java implementation of AMF3 deserializers used by WebORB for Java by Midnight Coders, version 5.1.1.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery.

Analysis Description

The Java implementation of AMF3 deserializers used by WebORB for Java by Midnight Coders, version 5.1.1.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.

http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution Third Party Advisory

Changed

Reference Type

https://codewhitesec.blogspot.com/2017/04/amf.html No Types Assigned

https://codewhitesec.blogspot.com/2017/04/amf.html Exploit, Third Party Advisory

Changed

Reference Type

https://www.kb.cert.org/vuls/id/307983 No Types Assigned

https://www.kb.cert.org/vuls/id/307983 Third Party Advisory, US Government Resource

CVE Modified by MITRE -
6/13/2018 9:29:30 PM

Action

Type

Old Value

New Value

Changed

Description

The Java implementation of AMF3 deserializers used by Flamingo amf-serializer by Exadel, version 2.2.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery.

The Java implementation of AMF3 deserializers used by WebORB for Java by Midnight Coders, version 5.1.1.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery.